Efficient Online Traffic Grooming Algorithms in WDM Mesh Networks with Drop-and-Continue Node Architecture

Size: px
Start display at page:

Download "Efficient Online Traffic Grooming Algorithms in WDM Mesh Networks with Drop-and-Continue Node Architecture"

Transcription

1 Efficient Online Traffic Grooming Algorithms in DM Mesh Networks with Drop-and-Continue Node Architecture Farid Farahmand, Xiaodong Huang, and Jason P. Jue Department of Electrical Engineering Department of Computer Science The University of Texas at Dallas, Richardson, Texas 78 Abstract As high capacity all-optical networks and DM technologies advance and merge together, aggregating lowspeed traffic streams onto high-speed wavelengths becomes more critical. Efficient aggregation techniques, known as traffic grooming, allow higher bandwidth utilization and can reduce request blocking probability. These algorithms can also result in lower network cost in terms of electronic switching. In this paper we focus on traffic grooming in DM mesh networks with dynamic traffic patterns. e offer two new grooming concepts called lightpath dropping and lightpath extension. These concepts are based on an alternative node architecture in which incoming optical signals can be dropped at a node, while optically continuing to the next node. Based on these concepts, we develop several grooming algorithms and study them under various network objectives. e also compare their performance with previously proposed lightpath-based grooming algorithms. Through extensive simulation results we show that our proposed approaches lead to lower request blocking probability and lower average number of logical hops when the number of transceivers per node is limited. Keywords: Lightpath, optimization algorithms, traffic grooming, DM mesh networks Introduction avelength division multiplexing (DM) technology offers a viable solution to fully exploit the enormous bandwidth available in fiber optics and is rapidly becoming the dominant transport infrastructure for future telecommunication networks. An attractive feature of this technology is its ability to economically and rapidly increase the transmission capacity of a single optical fiber. Currently, available DM systems support from to 6 channels per fiber, and vendors are promising 96 to 8 channel systems in the coming years. At the same time, researchers are developing DM systems with 6 and higher wavelengths channels offering multi-tera-b/s capacity. Recently, considerable attention has been given to combining DM technology with evolving all-optical backbone networks. By merging DM technology and optical cross-connects, individual wavelength channels can be set up between a source and a destination node, while optically passing through intermediate nodes. Such all-optical communication channels are called lightpaths []. Generally, lightpaths offer much higher capacity than the bandwidth required by individual users. For example, a lightpath can offer an available bandwidth of or Gb/s, whereas a single client typically requires a fraction of this bandwidth. Therefore, aggregating several low-bandwidth data streams into high-capacity lightpaths can provide efficient bandwidth utilization, which in turn reduces the network cost. The problem of multiplexing and routing low-speed traffic requests over lightpaths, as well as determining their wavelength assignments, is known as the traffic grooming problem. It has been shown that the general problem of traffic grooming with arbitrary traffic is NP-complete []. Heuristic algorithms that attempt to solve the traffic grooming problem are referred as grooming algorithms. Depending on the network assumptions and constraints, grooming algorithms can consider different routing criteria. e refer to such criteria as grooming policies. For example, in order to satisfy new requests, the grooming policy can be based on finding the shortest physical route in which we attempt to maximize wavelength utilization. The traffic grooming problem has been studied for a wide range of multi-layer networks, including SONET over DM or IP with Multi-Protocol Label Switching (IP/MPLS) over DM. In [], the authors consider the problem of traffic grooming for IP over DM optical networks to bridge the routing and resource allocation between the IP and optical networks. ith advances in GMPLS technology, grooming a set of Label Switched Paths (LSPs) into lightpaths for transport over a wavelength-routed network has also been studied []. Broadly speaking, however, traffic grooming studies can be categorized by the way in which they define the network topology (ring, mesh, etc.), the traffic scenario (static or dynamic), and the solution approach, such as providing a linear program formulation, or finding upper/lower bounds, or proposing heuristics algorithms. A comprehensive survey of the work done on traffic grooming in ring DM networks is provided in []. Much work has focused on traffic grooming in SONET/DM networks with ring topologies under a static traffic scenario, where the traffic pattern is known in ad-

2 vance. The main objective in these studies is to minimize the network equipment cost. In [], the authors provide a lower bound on the number of required SONET add-drop multiplexers (ADMs) and present a heuristic algorithm that performs closely to the bound. In [6] the objective is to minimize the number of ADMs, and in [7] minimizing the electronic switching cost is the main concern. An overview of studies on grooming in SONET/DM ring networks can be found in [8]. Traffic grooming has also been studied for DM mesh topologies when the traffic matrix is known in advance. In [9] an integer linear programming (ILP) optimization approach and some heuristics have been proposed to increase the network throughput. A different study in [] proposes a two-layered traffic grooming heuristic algorithm which attempts to reduce the overall network cost. In recent years, research on traffic grooming in DM mesh optical networks with dynamic traffic demands has also received some attention. Under a dynamic traffic scenario, requests randomly arrive or leave and lightpaths are dynamically set up or torn down. In [] -[] the authors propose several grooming algorithms in order to reduce the request blocking probability. A performance analysis model for a single-hop dynamic traffic grooming algorithm in DM mesh optical networks is presented in []. All these previous works are based on the assumption that a node can either drop or pass-through an incoming lightpath, as described in []. Our study, on the other hand, is based on an alternative node architecture in which incoming lightpaths can be dropped and continue travelling to the next node, optically. Under this assumption, we address the problem of the dynamic traffic grooming in wavelengthrouted DM mesh networks and attempt to minimize the connection request blocking probability. The main contribution of this paper is to introduce two new grooming concepts called lightpath dropping and lightpath extension. The basic underlying principle in lightpath dropping is that a lightpath can be dropped at its intermediate nodes, while continuing its path to the end node, optically. On the other hand, in lightpath extension, the basic idea is that a lightpath can be extended optically beyond its original end node. Based on lightpath dropping and extension concepts, we propose several grooming algorithms to support dynamic unicast traffic scenarios. e also develop an auxiliary graph model through which we implement our proposed algorithms. In our model, the grooming problem is solved by simply applying the shortest-path computation method, and different grooming policies can be represented by different weight-assignment functions. Using simulation techniques we examine the performance of our proposed grooming algorithms under specific network conditions. e compare our results with those obtained by other traffic grooming approaches, such as [] and [], in terms of blocking probability and average number of logical hops. e show that our proposed approaches lead to better performance when the number of transceivers is limited. The rest of this paper is organized as follows. In Section, we propose a two-layered node architecture in which optical signals can drop and continue along their optical path. In Section, we formulate the grooming problem and identify our basic network assumptions. In this section, we also introduce our proposed grooming algorithms in details. In Section, we discuss a case study and provide our simulation results. Section concludes the paper. Node architecture A general architecture of a DM node with optical cross-connect and electronic grooming capacity is shown in Fig. (a). This is a two-layered architecture consisting of photonic and electronic layers. The optical cross-connect (OXC) is the core of the photonic layer. It receives wavelengths from each of P input fibers and switches them optically to wavelengths on the appropriate output ports. The OXC may be equipped with wavelength converters, in which case incoming light can change color before continuing to the next node. More sophisticated architectures allow waveband-switching in which a group of wavelengths can switch together []. In a DM network, a node can function as a transparent or an opaque node. In a transparent node all wavelength channels are optically switched, whereas in an opaque node wavelength channels are terminated and undergo electronic processing and switching. A translucent node is transparent with respect to some of the optical data channels and opaque with respect to others. The electronic layer of the DM node, as shown in Fig. (a), consists of optical-electronic-optical (OEO) converters, multiplexers and demultiplexers, and the grooming switch fabric. Each multiplexer and demultiplexer consists of one or more transmitters and receivers, respectively. A transmitter (receiver) is connected to an add (a drop) port on the OXC and allows the lower rate signals to be inserted into (extracted from) the high-speed optical signals. The main cost of the DM node is due to its electronic layer, both in terms of add-drop capacity and grooming granularity, g. e define the grooming granularity as the lowest rate at which the equipment can carry, switch, multiplex, and demultiplex signals. For example, consider a node with full add-drop capacity, where all incoming wavelengths can be dropped, g = 6, and wavelengths are operating at OC-9 rates. In this case, each node will require P transmitters and receivers and an electronic switch fabric with g P inputs operating at OC- rates (recall, OC-9 = Gb/s and OC- = 6 Mb/s). e consider translucent nodes where optical crossconnects can have two distinct capabilities: Terminate-or- Continue and Drop-and-Continue. Optical cross-connects with terminate-or-continue (TOC) capacity, as shown in Fig. (b), can either terminate the incoming lightpath or allow the incoming lightpath to optically bypass the node. In such architectures, lightpaths are established between source-destination node pairs and cannot be directly utilized by intermediate nodes. At the destination node, the dropped traffic can be fully or partially switched to local clients. hen partially switched, the remaining lightpath traffic can be aggregated with other incoming or local traffic and retransmitted to the next node. Note that the retransmitted traffic can be carried to the next node on a different wavelength.

3 OXC Photonic Layer Electronic Layer Add Add Ports OEO E/O d out P TX Mulyiplexer Mux g. t to Edge Client Optical Cross Connect (OXC) [OC-M] Switch Fabric [OC-M/g] (a) P Drop Ports OEO O/E RX Mulyiplexer DeMux. g. r d in Drop from Edge Client TAC Bank Drop Ports (b) (c) Add Ports OXC i i i LPis dropped m m m (d) (e) (f) j j j LP is extended Figure : (a) A two-layered DM node architecture; (b) terminate-orcontinue (TOC) optical cross-connect; (c) drop-and-continue (DAC) optical cross-connect with tap-and-continue (DAC) optical devices. A network of nodes with DAC-based OXC architecture can perform the following operations: (d) lightpath dropping on an intermediate node; (e) lightpath extension to the next node; (f) lightpath dropping and lightpath extension. In a drop-and-continue (DAC) optical cross-connect, shown in Fig. (c), incoming optical signals can be split unequally. Consequently, a small portion of the optical signal can be dropped and processed electronically, while the remaining portion continues to travel optically to the next node with negligible degradation [6]. Such optical power splitting can be achieved by passive devices called tap-andcontinue. The main advantage of the DAC optical crossconnect architecture is that it allows an available lightpath to be shared by connection requests whose destinations are intermediate or end nodes of the lightpath. However, a potential drawback of this architecture is the excessive power loss that a lightpath may experience as it passes through many nodes. Due to lack of space, in this study we ignore power considerations and assume power loss in each node is negligible. Lightpath dropping and lightpath extension concepts can be supported using the DAC-based OXC architecture. Fig. (d) shows a network of DAC-based nodes where the bypassing lightpath is dropped at an intermediate node, while the end node of the lightpath remains the same. The DAC-based nodes also allow a terminated lightpath to extend beyond its original terminating node. This is shown in Fig. (e). Lightpath dropping and lightpath extension concepts can be implemented together, as shown in Fig. (f). In this case, the DAC-based nodes can drop the incoming lightpath on one or more intermediate nodes, while the lightpath is optically extended to the next node. Problem formulation and description of grooming algorithms In this section we first formulate the grooming problem and then describe our proposed grooming algorithms.. Problem formulation e formulate the traffic grooming problem as follows: Given the physical network topology, number of wavelengths on each fiber, number of transceivers at each node, and the incoming request s information (including its bandwidth demand requirement, granularity of traffic, connection duration, and source-destination node pair) find the routing for the incoming connection request such that the n n n blocking probability is minimized. In this context, we consider the following assumptions: all requests are unicast with sub-wavelength bandwidth requirements and random arrivals and departures; all nodes have full grooming capability and DACbased OXC architecture with no wavelength converters; all transmitters and receivers are tunable to all wavelengths; connection requests can be realized using multi-hop or single-hop routing; a connection request will be blocked when no wavelength channel with sufficient bandwidth is available. The routing criteria, which determine how a connection request should be established, directly impact the average number of transmitters and receivers required in each node, and thus affect the overall cost of electronics in the network. For example, consider a case in which a connection request can be established using an existing and a new lightpath. In this case, each of the two lightpaths requires a transmitter and a receiver. However, if the existing lightpath can be extended using a DAC-based node architecture, a single transmitter will be sufficient to satisfy multiple requests.. Previous work In terms of aggregating sub-wavelength connection requests, existing approaches can be divided into two basic categories: link-based and lightpath-based. In the linkbased approach (LBA), optical paths are only established between adjacent nodes, and the optical paths can support multiple requests with sub-wavelength demands. Thus, the LBA simply involves finding the shortest physical path for each connection request and requires no wavelength routing [7]. It can be seen that when all nodes have a sufficient number of transmitters and receivers, the LBA can result in a very efficient bandwidth utilization and low request blocking probability. However, LBA s tradeoff is its high cost of electronics. In lightpath-based grooming approaches, multiple connection requests with sub-wavelength demands can share the same lightpath between a source-destination node pair. Different grooming approaches have been considered to aggregate multiple requests in a single lightpath. One simple approach, known as single-hop end-to-end grooming, is based on establishing dedicated lightpaths to satisfy requests with the same source-destination nodes [8]. Hence, in this case, all intermediate nodes are transparent to the incoming optical data. Note that, in this approach, wavelength routing and wavelength assignment are limited to finding an available wavelength on the shortest path between the source and destination node. The tradeoff to the simplicity of the single-hop end-to-end grooming approach is its inefficiency and low wavelength utilization. A widely considered lightpath-based traffic grooming is a multi-hop approach in which requests share a single or

4 multiple lightpaths to reach their destination nodes. In this approach, once a lightpath is established, its source and destination nodes cannot be modified until all its embedded requests are serviced. Furthermore, in this approach, the intermediate nodes along the lightpath cannot receive or transmit new data into the lightpath unless the new data is sent to the lightpath s source node. Different grooming policies can be applied to the multi-hop lightpath-based algorithm (recall that grooming policies determine how to route and aggregate connection requests in the network). Three typical grooming policies are as follows: () minimizing the logical hop-length; () minimizing the physical hop-length; and () minimizing new lightpath setup. Logical hop-length of a route is the total number of logical links traversed by that route. On the other hand, physical hop-length of a logical link is the total number of physical links (fibers) traversed by that logical link. Minimizing the new lightpath setup involves utilizing existing lightpaths prior to establishing new ones. The single-hop end-to-end and multi-hop lightpathbased grooming algorithms are based on a terminate-orcontinue optical cross-connect architecture, as shown in Fig. (b). In this architecture, a node can either drop or pass-through the incoming traffic. Once a lightpath is dropped and electronically switched at a node, it is possible that some of its embedded requests are retransmitted to the next node.. Algorithms In this section we introduce our proposed lightpathbased algorithms, in which lightpaths can dynamically be dropped at multiple nodes as new unicast connection requests arrive. e distinguish these algorithms based on their capability to perform one or both of the following operations: Dropping on intermediate nodes. In this case, the entire lightpath can be dropped at one or more intermediate nodes, while the end node of the lightpath remains the same. Extending beyond the original end node. In this case, while the incoming lightpath is still dropped at its original end node, the lightpath is optically extended to the next node. The clear motivation in using our proposed algorithms is that when the number of transceivers is limited, the algorithms can provide significant improvement in terms of blocking probability and average number of logical hops over the traditional lightpath-based algorithms described above. In other words, for the same network performance, our proposed algorithms can significantly reduce the overall electronic cost throughout the network. Intermediate dropping and lightpath extension capabilities can be supported by the drop-and-continue optical cross connect architecture, shown in Fig. (c). Recall that in such architectures, an incoming request can be dropped, passedthrough, or dropped and continued to the next node. e present an auxiliary graph to model the current state of the network. e use this graph model to implement our proposed grooming algorithms and examine their performance under different grooming policies. e begin by introducing the general case, in which dropping at intermediate nodes and lightpath extension are both allowed. Then, we discuss different variations of the general case where either intermediate dropping or lightpath extension is allowed... Auxiliary graph model Given a network with N nodes and wavelengths per fiber link, the physical network can be represented by a graph G p = (V p, E p ). In this representation, V p is the set of network nodes, and E p is the set of links connecting the nodes. The current status of the network can be modelled by a - layer auxiliary grooming graph, GG = (V, E), where each layer corresponds to the state of a wavelength in the network. A vertex v V in the auxiliary graph, GG, represents the optical receiving or transmitting capabilities of a physical node on a particular wavelength layer. Therefore, a physical node can be represented by receiving and transmitting vertices. On the other hand, E is a set of weighted directional edges which corresponds to available optical paths between node pairs. In our graph model, we define two basic edge types, namely, grooming edges and optical edges. A grooming edge abstracts the node s grooming capacity enabling an optical signal to be dropped and processed electronically. Therefore, for each physical node, there will be one grooming edge between a single receiving vertex and each transmitting vertex. e denote a grooming edge from a receiving vertex on layer x to a transmitting vertex on layer y on node i by GP x,y i. An optical edge, on the other hand, represents an alloptical path between a node pair. Depending on the node architecture, in our graph model, we define the following optical edges, which can be established between a node pair (i, k) with one intermediate node j or more, on wavelength layer w: Existing lightpath, LPik w, describing an active lightpath currently carrying traffic between nodes i and k; Potential lightpath, P LPik w, representing one or more available wavelength links, which can support a new lightpath from node i to k; Potential extended lightpath, P ELPik w, expressing an existing lightpath, LPij w, which can potentially traverse optically beyond its current end node, j, and reach node k through one or more available wavelength links; Sub-lightpath, SLPij w, describing a possible optical connection between the source node, i, and an intermediate node, j, of the existing lightpath, LPik w. Note that for each existing lightpath with I intermediate nodes, there will be as many as I sub-lightpaths, all having the same free capacity. These concepts are illustrated in Fig. (a).

5 Phy link Sub- Lightpath Potential Lightpath Existing Lightpath Potential Extended Lightpath PLP jn PLP jk i m j n k LP ij PELP ik PELP in (a) i m j n k LP in Phy link Existing Lightpath Carrying Request R(i,n) New RequestR(i,k) (c) i m j n k LP in Phy link Existing Lightpath Carrying Request R(i,n) First RequestR(i,k) Second RequestR(i,j) i Original LP in (b) LP in is extended m j n k LP in Phy link Existing Lightpath Carrying Request R(i,n) New RequestR(i,k) Figure : (a) Illustration of different optical edges used in the auxiliary graph; (b) The algorithm allows lightpath extension to node k and dropping on intermediate nodes j and n; (c) The LPwDnE algorithm allows a new request to share an existing lightpath while dropping on its intermediate node j; (d) Using the LPnDwE algorithm, a lightpath can be shared by multiple requests and extended beyond its original destination from node n to k... Lightpath-based grooming with intermediate dropping and extension capacity () The algorithm supports two basic operations in order to route new connection requests: () existing lightpaths can be dropped at their intermediate nodes, while continuing their path to the end node; () existing lightpaths can be extended beyond their end nodes. These concepts are shown in Fig. (b). The main motivation for implementing the is to provide higher flexibility in finding the most appropriate routing path between a node pair. The algorithm consists of two basic routines: ReqSetup and ReqTeardown. For each new connection request, the ReqSetup routine constructs a new auxiliary graph representing the current status of the network and finds the shortest path between the requested node pair. Details of the ReqSetup routine upon arrival of a new request Req(s, d, B), where s and d are the source and destination nodes, respectively, and B is the request s demand, are described in Table. On the other hand, when a request is completed the ReqTeardown routine is executed and operates as follows: Step : The request s demand is removed from all lightpaths carrying the request; Step : All inactive wavelength links along lightpaths carrying the request are removed. If all wavelength links on a lightpath are inactive, the entire lightpath will be removed; Step : The network state is updated accordingly to represent the latest available resources. e illustrate the above concepts by means of an example. Fig. (a) shows a four-node network with four unidirectional fiber-links, each having two wavelengths. Each node is equipped with two transmitters and two receivers and has full-grooming capacity (the entire incoming data can be groomed). Initially, we assume that no connections exist in the network. Fig. (b) shows the current state of the network after a number of connection requests are established. Upon arrival of a new request, the auxiliary graph, (d) Table : Algorithm description for the ReqSetup routine in. For a given request Req(s, d, B):. For each wavelength layer w and each node i on the physical graph G p (a) Find the shortest path between node i and every other node j, such that a potentially new lightpath can be established between the two nodes, P LP ij. (b) For every existing lightpath, between nodes i and j, LP ij, with free capacity C f B, i. Find all possible sub-lightpaths between node i and all the intermediate nodes on LP ij. ii. Find all possible potential lightpaths by extending LP ij on available links. (c) Assign weight to all edges including potential lightpaths, potential extended lightpaths, existing lightpaths, sublightpaths, and grooming edges according to the grooming policy.. Search for the shortest path on the auxiliary graph between node s and d. If no such path was found, discard the request; otherwise, continue to next step.. Set up the route for the request Req(s, d, B) and update the network status to reflect the latest connections and available resources. shown in Fig. (c) can be established. e assume LP, and LP, have no available bandwidth and thus they are not shown in the auxiliary graph. Using the two available wavelength links between node pairs (,) and (,), we can generate distinct potential lightpaths on Layer. The existing lightpath between node pair (,) can also be extended to Nodes and. Furthermore, the existing lightpath on wavelength Layer between Nodes and can support a sub-lightpath between node pairs (,), denoted by SLP,. Let us assume that Node requests a new connection to Node. Based on available resources, indicated by the auxiliary graph in Fig. (c), this request can be satisfied through the following shortest multi-hop path: P LP,, GP,, LP,, GP,, and LP,. The complexity of is mainly attributed to the ReqSetup routine, which in turn is directly tied to complexity of the shortest path algorithm. For example, assuming we implement Dijkstra s shortest path algorithm, the worst-case complexity of the ReqSetup will be equivalent to finding all available shortest paths between all nodes on all wavelength layers and the shortest path for the Req(s, d, B) among all layers between the node pair (s, d). Thus, the worst-case complexity will be equivalent to O(wn ) + O((nw) ). Note that if the number of wavelengths is much larger than the number of nodes in the network, as is the case in backbone networks with dense DM links, the dominating factor will be O((nw) ). As mentioned before, in the algorithm, an incoming connection request is routed according to the shortest path from its source to destination node in the auxiliary graph, GG. The weights assigned to different edges in the auxiliary graph determine how to route connection requests in the network. Such weight assignment is determined according to the grooming policy. In our study, we consider four grooming policies for the algorithm:

6 Cf = Free Capacity avelenght link avelenght link Lightpath on L Lightpath on L Transmitting Vertex Receiving Vertex Potential Extended Lightpath Potential Lightpath Sub-lightpath Grooming path Existing lightpath avelength Layer avelength Layer (a) () PELP, Cf= (b) Cf= Node Node Node Node () SLP, () PLP, Figure : (a) An example of a four-node network with two wavelengths in each fiber; (b) the current state of the network with available wavelength links; (c) the auxiliary graph, GG, for the current state of the network shown in (b). Minimizing the number of logical hops (MLH). In this case the objective is to minimize electronic processing for connection requests. Therefore, the weight assignment for all optical edges will be the same. Minimizing the number of physical hops (MPH). Thus, the objective is to maximize wavelength utilization. The assigned weights to all optical edges must, therefore, be equivalent to the number of physical hops between the source-destination node pair. Minimizing the number of new lightpaths (MNL). The objective in this case is to minimize the number of transmitters and receivers. Thus, the existing lightpaths and potential extended lightpaths will have a much lower weight than new lightpaths. Minimizing the number of physical hops on lightpaths carrying the request (MTH). Thus, the objective is to maximize wavelength utilization. In this case, the weight assignment for all optical edges is equivalent to the number of physical hops on the entire edge, including the ones beyond the destination node. Note that we distinguish between the MTH and MPH grooming policies because the number of physical hops between a node pair and the total number of physical hops along the single-hop or multi-hop lightpaths connecting the same node pair can be different. In general, grooming edges only abstract a node s grooming capacity, therefore, regardless of the grooming policy, their assigned weight is always much smaller than those of optical edges. hen multiple shortest paths are available for a connection request, it is efficient to choose a secondary objective to select the most appropriate available path. Therefore, in our graph model, we consider a primary and a secondary objective for each grooming policy. For example, when the primary objective is minimizing the number of logical hops and more than a single shortest route is available, we choose the route with the least number of physical hops. () LP, (c) () LP,.. Lightpath-based grooming with intermediate dropping capacity (LPwDnE) The LPwDnE grooming algorithm can be achieved by allowing lightpaths to be dropped at any intermediate node. The motivation for implementing LPwDnE is to provide a flexible lightpath sharing mechanism. Details of the LPwDnE algorithm are similar to the ReqSetup and ReqTeardown routines described for the algorithm. However, since no lightpath extension is allowed in LPwDnE, Step -b(ii) in the ReqSetup routine will be eliminated. The basic operation of LPwDnE is illustrated in Fig. (c). Identical grooming policies and wavelength assignment criteria, as described for, are also applied for the LPwDnE algorithm... Lightpath-based grooming with extension capacity(lpndwe) The basic idea in this traffic grooming algorithm is to allow the existing lightpaths to be extended optically on available wavelength links. hen a lightpath is extended beyond its current end node, existing connections must not be interrupted. The basic operation of LPnDwE is shown in Fig. (d). A clear advantage of LPnDwE is reducing the number of logical hops between a node pair and thus lowering the total electronic equipment cost in the network. Similar steps described in the ReqSetup and ReqTeardown routines for, are used to implement the LPnDwE algorithm. However, since no intermediate dropping is allowed, Step -b(i) in the ReqSetup routine will be eliminated. All four grooming policies described for can also be applied to the LPnDwE algorithm... Lightpath-based grooming with no intermediate dropping and no extension capacity () The is identical to the lightpath-based grooming approach described in other literature, including []. In this case, connection requests sharing a lightpath can only be dropped at the end node of the lightpath. In addition, once a lightpath is established, its source-destination nodes cannot be modified. e implement the algorithm using our proposed auxiliary graph. Upon request arrivals and departures, similar steps in the ReqSetup and ReqTeardown routines will be implemented, respectively. However, since no intermediate dropping or lightpath extension is supported by, in the ReqSetup routine, Step - b must be ignored. Similar weight assignments for implementing different grooming policies, as described for, are also applied to. Clearly, in, the MTH and MPH grooming policies will be identical. PERFORMANCE COMPARISON In this section we present the simulation results for each of the introduced grooming algorithms and compare their performances. e start by applying the proposed algorithms to a simple network.

7 . Numerical Comparison Between Different Algorithms l l l 6 l l l 6 Fig. (a) shows a 7-node network with unidirectional fiber links, each having unity length and a single wavelength. e consider implementing the following grooming algorithms: LBA,, LPwDnE, LPnDwE, and for a series of incoming requests. For each case we intend to determine the total request blocking and average number of logical hops. In this example, each node is assumed to have 7 receivers and transmitters and we consider minimizing the number of logical hops as the grooming policy. e also assume that initially, at T, all links in the network are available and new requests arrive between T and T 8 in the following order: (,),(,),(,),(,),(,6). Each request has a demand equivalent to / of the wavelength capacity and a duration longer than T 8. First, we implement the link-based algorithm (LBA) where optical paths are established only between adjacent nodes. In this case, each connection request is satisfied by finding the shortest path between its source and destination nodes. The average number of logical hops is calculated to be /. The resulting grooming solution is shown in Fig. (b). The request routing using the is shown in Fig. (c). In this case, two requests are blocked. Fig. (d) shows the routing configuration resulted by implementing the LPwDnE algorithm. Notice that the request (,6) is dropped at Node and it is aggregated on the existing lightpath from Node to Node. Although at Node the entire lightpath is dropped, only request (,6) is passed on to Node 6. Using the LPwDnE algorithm, all the requests are satisfied and compared to LBA, a relatively lower average hop distance can be achieved. Routing requests using LPnDwE is shown in Fig. (e). Upon arrival, request (,) utilizes the existing lightpath between Nodes and. Consequently, the lightpath will be extended to Node and its available bandwidth is reduced by the latest request s demand. Using LPnDwE, only three of the requests can be satisfied, however, compared to a lower average hop distance can be archived. Finally, Fig. (f) shows the status of the network after routing all five requests using the algorithm. Similar to LPnDwE, upon receiving connection request (,), the lightpath between Nodes and is extended. In addition, since lightpath dropping on intermediate nodes is allowed, requests (,) and (,6) can be carried over the existing lightpath and dropped at Node. satisfies all incoming requests with relatively lower average hop distance compared to LBA and. A quick look at Fig. shows that requires the lowest total number of transmitters and receivers.. Simulation results In this section we discuss some results obtained by implementing the proposed grooming algorithms, namely, LPnDwE, LPwDnE, and. e have chosen the NSFnet backbone, shown in Fig., as our test network and consider the following assumptions for the simulation environment: l 6 l 7 l 9 l 8 (a) Network topology (b) LBA: {(,),(,),(,),(,),(,6)} (c) : {(,),(,),(,)} 6 (d) LPwDnE: {(,),(,),(,),(,),(,6)} (e) LnDwE: {(,),(,),(,)} (f) : {(,),(,),(,),(,),(,6)} Figure : An example of a 7-node network topology and the grooming solution using different grooming algorithms. Incoming requests arrive in the following order: (,),(,),(,),(,),(,6). Figure : The NSF network with nodes, bi-directional links, and diameter of. 7 6 The traffic requests are generated and terminated dynamically. Each link is bidirectional with = wavelenghts in each direction operating at OC-9 rate. All nodes have full grooming capacity with r receivers, t transmitters, and no wavelength-converters. Each request s demand can be one of the following rates: OC-, OC-, or OC-8. The traffic arrival is a Poisson process and the request s duration is exponentially distributed. In this section we assume that traffic is uniformly distributed between all node pairs, and the number of transmitters and receivers per node is r = 6 and t =, respectively. Figs. 6-9 show the performance of each proposed algorithm under the following grooming policies: MPH, MLH, MNL, and MTH. It can be seen that regardless of the grooming policy, the best network performance in terms of request blocking probability is achieved by the algorithm. In fact, comparing the and algorithms, it is found that the former performs between to percent better, depending on the network load and grooming policy. This indicates that when a limited number of transmitters are available at each node, provides a more efficient lightpath sharing mechanism. The performance improvement of becomes less significant when the network load is very high and all resources are fully utilized, or when the network load is very low and a sufficient number of transmitters and receivers are always available to satisfy new requests. Under such extreme conditions, since network resources are either highly overutilized or under-utilized, efficient bandwidth sharing does not significantly impact the blocking probability. Further analysis show that depending on the grooming policy, the relative performance between the LPnDwE 8 9 6

8 and LPPwDnE algorithms varies. Under MPH, MLH, and MTH, these algorithms perform similarly and they both outperform in terms of blocking probability, as well as the average number of logical hops. hen the grooming policy is to minimize the number of new lightpaths (MNL), LPnDwE performs worse than LPwDnE and, as shown in Fig. 8. This can be explained by the fact that under MNL grooming policy, LPnDwE does not attempt to establish new lightpaths unless all existing lightpath capacities are exhausted. Thus, existing lightpaths continue to carry more connection requests and continue to extend, which in turn, potentially blocks more intermediate nodes from directly utilizing the wavelength channel. Fig. compares the average number of logical hops obtained by different grooming algorithms using the MTH grooming policy. Note that the average number of logical hops significantly improves when lightpaths can be dropped at the intermediate nodes or extended. In fact, at high loads, the algorithm was found to perform about percent better in terms of the average number of logical hops when compared to the algorithm. Recall that lowering the average number of logical hops on an optical path results in less electronic processing. Fig. also indicates that at low loads, LPwDnE performs better than LPnDwE, however, as the network load increases LPnDwE starts outperforming LPwDnE. This can be explained by the fact that under low loading condition, lightpaths have greater opportunities to be dropped. Simulation results show that similar trends can be observed when other grooming policies are implemented. Figs. - show the performance of the algorithm using different grooming policies in terms of request blocking probability and average number of logical hops. Note that the best performance is achieved under the MTH grooming policy, whereas the MNL policy results in the poorest performance. Using the MNL policy, the algorithm attempts to use available resources prior to utilizing new ones. Thus, a few existing lightpaths can continue extending throughout the network, which in turn can potentially block more intermediate nodes from directly utilizing the wavelength channel. On the other hand, the MLH policy is expected to provide the lowest average number of logical hops. This is because, under such a policy, the algorithm attempts to satisfy connection requests using lightpaths passing through the least number of nodes. Next, we examine the performance of using MTH grooming policy as the number receivers per node changes between and. In this case, we assume the number of transmitters is fixed and set to. The results shown in Figs. - indicate that using the algorithm, as the number of receivers per node increases, the blocking probability and average number of logical hops improve. Such improvements become less apparent as the number of receivers continue to increase beyond r =. In fact, hardly any improvement is achieved as the number of receivers changes from to. Similar trends can be observed under other grooming policies. Figs. -6 show the request blocking probability and average number of logical hops, respectively, using the algorithm as the number of receivers varies between and. Note that the main performance improvement occurs when the number of receivers increases from to 6. Additional receivers appear to have no major contribution to the performance. These results imply, that in general, compared to, the algorithm is more sensitive to the number of receivers per node, and it utilizes the receiver units more efficiently. hen lightpath extension is allowed, a few lightpaths can potentially extend and pass-through many nodes. This potentially results in blocking many intermediate nodes from directly accessing the wavelength channel. One way to minimize such cases is to impose a hop constraint in terms of number of nodes which can lie on a lightpath(s) connecting a node pair. Figs. 7-8 show the blocking probability and average number of logical hops using the and algorithms when a hop constraint is imposed. Due to lack of space, we only show the results for the MTH grooming policy. e choose the hop constraint to be twice the network diameter, ( = 6). For moderate to high load conditions, imposing a hop constraint can improve the performance by about 6 percent. Fig. 7 suggests that under MTH, when the load is low, the hop constraint does not impact the blocking probability using the algorithm. This is because, under such conditions, lightpaths are less likely to be extended. Conclusion This paper addresses the problem of dynamic traffic grooming in DM mesh networks under both uniform and non-uniform unicast traffic scenarios. In this study, we propose two effective traffic grooming concepts, namely, lightpath dropping and lightpath extension. These concepts are based on an alternative node architecture called drop-andcontinue. In this architecture, incoming lightpaths can be dropped and switched electronically, while traversing to the next node optically. Based on these concepts, we develop several grooming algorithms. e investigate the performance of each algorithm in terms of request blocking probability and average number of logical hops under different network objectives. Comparing these results with the ones obtained from previously proposed lightpath-based grooming algorithms, it suggests that our proposed algorithms significantly improve the network performance when the number of transmitters is limited. e believe this preliminary work with careful power considerations can be extended to multicast traffic grooming in order to improve the network performance. References [] I. Chlamtac, A. Ganz, and G. Karmi, Lightpath communications: a novel approach to high bandwidth optical DN s, IEEE Transactions on Communications, vol., no. 7, pp. 7-8, July 99. [] A.L. Chiu and E.H. Modiano, Traffic grooming algorithms for reducing electronic multiplexing costs in DM ring networks, IEEE/OSA Journal of Lightwave Technology, vol. 8, no., pp. -, Jan.. [] C. Xin, et al., An agent based traffic grooming and management mechanism for IP over optical networks, Proceedings, IEEE IC- CCN, Computer Communications and Networks, pp. -, Miami, FL, Oct..

9 .. LPnDwE LPwDnE Figure 6: Blocking probability of different grooming algorithms using the MPH grooming policy. [] D. Zhemin, M. Hamdi, and J.Y.B Lee, Integrated routing and grooming in GMPLS-based optical networks, Proceedings, IEEE International Conference on Communications (ICC), vol., pp. 8-88, Paris, France, June. [] R. Dutta and G.N. Rouskas, Traffic grooming in DM networks: past and future, IEEE Network, vol. 6, no. 6, pp. 6-6, Nov.-Dec.. [6] O. Gerstel, P. Lin, and G. Sasaki, Combined DM and SONET network design, Proceedings, IEEE INFOCOM 999, vol., pp. 7-7, New York, NY, March 999. [7] V. R. Konda and T. Y. Chow, Algorithm for traffic grooming in optical networks to minimize the number of transceivers, IEEE orkshop on High Performance Switching and Routing (HPSR), pp. 8-, Dallas, TX, May. [8] A. R. B. Billah, B. ang, and A. A. S. Awwal, Effective traffic grooming algorithms for SONET/DM ring net-works, Photonic Network Communications, vol. 6, no., pp. 9-8, Sep.. [9] K. Zhu and B. Mukherjee, Traffic grooming in an optical DM mesh network, IEEE Journal on Selected Areas in Communications, vol., no., pp. -, Jan.. [] S. De Maesschalck, et al., Multi-layer traffic grooming in networks with an IP/MPLS layer on top of a meshed optical layer, Proceedings, IEEE GLOBECOM, vol., pp. 7-7, San Francisco, CA, Dec.. [] H. Zhu, et al., Dynamic traffic grooming in DM mesh networks using a novel graph model, IEEE GLOBECOM, vol., pp , Taipei, Taiwan, Nov.. [] K. Zhu and B. Mukherjee, On-line approaches for provisioning connections of different bandwidth granularities in DM mesh networks, Proceedings, Optical Fiber Communication Conference and Exhibit (OFC), pp. 9-, Anaheim, CA, March. [] C. Xin, C. Qiao, and S. Dixit, Traffic grooming in mesh DM optical networks - performance analysis, IEEE GLOBECOM, vol. 7, pp. 7-76, San Francisco, CA, Dec.. [] O. Gerstel, R. Ramaswami, and G.H. Sasaki, Cost-effective traffic grooming in DM rings, IEEE/ACM Transactions on Networking, vol. 8, no., pp. 68-6, Oct.. [] G. Huiban, S. Perennes, and M. Syska, Traffic grooming in DM networks with multi-layer switches, Proceedings, IEEE International Conference on Communications (ICC), vol., pp , Anchorage, AK, May. [6] M. Ali and J. Deogun, Power-efficient design of multicast wavelength-routed networks, IEEE Journal on Selected Areas in Communications, vol. 8, no., pp. 8-86, Oct.. [7] P.J. Lin and E. Modiano, Traffic grooming in DM networks, IEEE Communications Magazine, vol. 9, no. 7, pp. -9, July. [8] C. Xin, C. Qiao, and S. Dixit, Analysis of single-hop traffic grooming in mesh DM optical networks, Proceedings, SPIE OptiComm, pp. 9-, Dallas, TX, Oct.... LPnDwE LPwDnE Figure 7: Blocking probability of different grooming algorithms using the MLH grooming policy... LPnDwE LPwDnE Figure 8: Blocking probability of different grooming algorithms using the MNL grooming policy... LPnDwE LPwDnE Figure 9: Blocking probability of different grooming algorithms using the MTH grooming policy. Average Number of Logical Hops LPnDwE LPwDnE Figure : Average number of logical hops under different grooming algorithms using the MTH policy.

10 .... MPH MLH MNL MTH Rcvr- Rcvr-6 Rcvr-8 Rcvr- Rcvr Figure : Blocking probability under using different grooming policies. Average Number of Logical Hops MPH MLH MNL MTH Figure : Average number of logical hops under using different grooming policies... Rcvr- Rcvr-6 Rcvr-8 Rcvr- Rcvr Figure : Blocking probability of using the MTH grooming policy with t = and r = [, 6, 8,, ]. Average Number of Logical Hops Rcvr- Rcvr-6. Rcvr-8 Rcvr- Rcvr Figure : Average number of logical hops under using the MTH grooming policy with t = and r = [, 6, 8,, ]. Figure : Blocking probability of using the MTH grooming policy with t = and r = [, 6, 8,, ]. Average Number of Logical Hops Rcvr- Rcvr-6. Rcvr-8 Rcvr- Rcvr Figure 6: Average number of logical hops under using the MTH grooming policy with t = and r = [, 6, 8,, ]... - max 6 - max Figure 7: Blocking probability with a hop constraint of 6 using MTH grooming policy. Average Number of Logical Hops max 6 - max Figure 8: Average number of logical hops with a hop constraint of 6 using MTH grooming policy.

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees An Algorithm for raffic rooming in WDM Mesh Networks with Dynamically Changing Light-rees Xiaodong Huang, Farid Farahmand, and Jason P. Jue Department of Computer Science Department of Electrical Engineering

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1173 A Comprehensive Study on Next-Generation Optical Grooming Switches Keyao Zhu, Student Member, IEEE, Hui Zang, Member,

More information

Available online at ScienceDirect

Available online at   ScienceDirect Available online at www.sciencedirect.com ScienceDirect Procedia Technology 0 ( 0 ) 900 909 International Conference on Computational Intelligence: Modeling, Techniques and Applications (CIMTA-0) Multicast

More information

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks

A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 2, APRIL 2003 285 A Novel Generic Graph Model for Traffic Grooming in Heterogeneous WDM Mesh Networks Hongyue Zhu, Student Member, IEEE, Hui Zang, Member,

More information

Traffic Grooming in WDM Networks

Traffic Grooming in WDM Networks TOPICS IN LIGHTWAVE SERIES Traffic Grooming in Networks Eytan Modiano, MIT Philip J. Lin, Tellabs ABSTRACT The recent emergence of wavelength-division multiplexing technology has led to a tremendous increase

More information

Delayed reservation decision in optical burst switching networks with optical buffers

Delayed reservation decision in optical burst switching networks with optical buffers Delayed reservation decision in optical burst switching networks with optical buffers G.M. Li *, Victor O.K. Li + *School of Information Engineering SHANDONG University at WEIHAI, China + Department of

More information

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh,

More information

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks

Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Traffic Grooming and Regenerator Placement in Impairment-Aware Optical WDM Networks Ankitkumar N. Patel, Chengyi Gao, and Jason P. Jue Erik Jonsson School of Engineering and Computer Science The University

More information

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS Nizar Bouabdallah^'^, Emannuel Dotaro^ and Guy Pujolle^ ^Alcatel Research & Innovation, Route de Nozay, F-91460 Marcoussis, France

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Network Topology Control and Routing under Interface Constraints by Link Evaluation Network Topology Control and Routing under Interface Constraints by Link Evaluation Mehdi Kalantari Phone: 301 405 8841, Email: mehkalan@eng.umd.edu Abhishek Kashyap Phone: 301 405 8843, Email: kashyap@eng.umd.edu

More information

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Virtual Topology Design A. Gençata İTÜ, Dept. Computer Engineering 2005 Virtual Topology A lightpath provides single-hop communication between any two nodes, which could be far apart in

More information

Splitter Placement in All-Optical WDM Networks

Splitter Placement in All-Optical WDM Networks plitter Placement in All-Optical WDM Networks Hwa-Chun Lin Department of Computer cience National Tsing Hua University Hsinchu 3003, TAIWAN heng-wei Wang Institute of Communications Engineering National

More information

Autonomous Clustering-Based Heterogeneous Waveband Switching in WDM Networks

Autonomous Clustering-Based Heterogeneous Waveband Switching in WDM Networks Autonomous Clustering-Based Heterogeneous aveband Switching in DM Networks Mengke Li and Byrav Ramamurthy Department of Computer Science and Engineering, University of Nebraska-Lincoln, USA Email: {mli,

More information

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks Proceedings of the International Conference on Computer and Communication Engineering 008 May 3-5, 008 Kuala Lumpur, Malaysia A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

More information

Cost-Effective Traffic Grooming in WDM Rings

Cost-Effective Traffic Grooming in WDM Rings 618 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 5, OCTOBER 2000 Cost-Effective Traffic Grooming in WDM Rings Ornan Gerstel, Member, IEEE, Rajiv Ramaswami, Fellow, IEEE, and Galen H. Sasaki, Member,

More information

Hierarchical Traffic Grooming Formulations

Hierarchical Traffic Grooming Formulations Hierarchical Traffic Grooming Formulations Hui Wang, George N. Rouskas Operations Research and Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 USA Abstract Hierarchical

More information

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings

A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings A Wavelength Assignment Heuristic to Minimize SONET ADMs in WDM rings Xin Yuan Amit Fulay Department of Computer Science Florida State University Tallahassee, FL 32306 {xyuan, fulay}@cs.fsu.edu Abstract

More information

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks Internet Traffic Characteristics Bursty Internet Traffic Statistical aggregation of the bursty data leads to the efficiency of the Internet. Large Variation in Source Bandwidth 10BaseT (10Mb/s), 100BaseT(100Mb/s),

More information

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue Sandip R. Shinde Research Scholar, Sathyabama University, Chennai & Assistant Professor, Vishwakarma

More information

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS Ching-Lung Chang, Yan-Ying, Lee, and Steven S. W. Lee* Department of Electronic Engineering, National

More information

A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks

A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks Limin Tang, Wanjun Huang, Miguel Razo, Arularasi Sivasankaran, Paolo Monti, Marco Tacca, Andrea Fumagalli

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima Graduate School of Information Science and Technology, Osaka University - Yamadaoka, Suita, Osaka 60-08, Japan

More information

On Optimal Traffic Grooming in WDM Rings

On Optimal Traffic Grooming in WDM Rings 110 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 On Optimal Traffic Grooming in WDM Rings Rudra Dutta, Student Member, IEEE, and George N. Rouskas, Senior Member, IEEE

More information

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks TECHNICAL RESEARCH REPORT A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks by Kwang-Il Lee, Mark Shayman TR 2003-3 I R INSTITUTE FOR SYSTEMS RESEARCH

More information

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Dynamic Wavelength Assignment for WDM All-Optical Tree Networks Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager Laboratory for Information and Decision Systems Massachusetts Institute of

More information

1. INTRODUCTION light tree First Generation Second Generation Third Generation

1. INTRODUCTION light tree First Generation Second Generation Third Generation 1. INTRODUCTION Today, there is a general consensus that, in the near future, wide area networks (WAN)(such as, a nation wide backbone network) will be based on Wavelength Division Multiplexed (WDM) optical

More information

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks P. Venkataravikumar 1, Prof. Bachala Sathyanarayana 2 Research Scholar 1, Department of Computer Science

More information

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks

Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Toward a Reliable Data Transport Architecture for Optical Burst-Switched Networks Dr. Vinod Vokkarane Assistant Professor, Computer and Information Science Co-Director, Advanced Computer Networks Lab University

More information

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS International Journal of Information Technology and Knowledge Management January-June 2012, Volume 5, No. 1, pp. 69-72 EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS Sushil Chaturvedi

More information

Analysis and Algorithms for Partial Protection in Mesh Networks

Analysis and Algorithms for Partial Protection in Mesh Networks Analysis and Algorithms for Partial Protection in Mesh Networks Greg uperman MIT LIDS Cambridge, MA 02139 gregk@mit.edu Eytan Modiano MIT LIDS Cambridge, MA 02139 modiano@mit.edu Aradhana Narula-Tam MIT

More information

Traffic Grooming for Survivable WDM Networks Shared Protection

Traffic Grooming for Survivable WDM Networks Shared Protection Traffic Grooming for Survivable WDM Networks Shared Protection Canhui (Sam) Ou, Keyao Zhu, Hui Zang, Laxman H. Sahasrabuddhe, and Biswanath Mukherjee Abstract This paper investigates the survivable trafficgrooming

More information

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

Optical Communications and Networking 朱祖勍. Nov. 27, 2017 Optical Communications and Networking Nov. 27, 2017 1 What is a Core Network? A core network is the central part of a telecommunication network that provides services to customers who are connected by

More information

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength 166 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 20, NO. 1, JANUARY 2002 Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

More information

Power Efficient Traffic Grooming in Optical WDM Networks

Power Efficient Traffic Grooming in Optical WDM Networks Power Efficient Traffic Grooming in Optical WDM Networks Emre Yetginer Tubitak UEKAE Ilhan Tan Kislasi Umitkoy, Ankara 06800 Turkey Email: emre.yetginer@iltaren.tubitak.gov.tr George N. Rouskas Department

More information

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks Amit Shukla, L. Premjit Singh and Raja Datta, Dept. of Computer Science and Engineering, North Eastern Regional Institute

More information

Optical wavelength-division multiplexing (WDM)

Optical wavelength-division multiplexing (WDM) A review of traffic grooming in WDM optical networks: architectures and challenges Keyao Zhu Biswanath Mukherjee Computer Science Department University of California, Davis Davis, CA USA ABSTRACT The transmission

More information

WAVELENGTH-division-multiplexing (WDM) is increasingly. The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks

WAVELENGTH-division-multiplexing (WDM) is increasingly. The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks 1396 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 8, OCTOBER 2004 The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks Randall A. Berry, Member, IEEE, and

More information

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks Balaji Palanisamy, T. Siva Prasad, N.Sreenath 1 Department of Computer Science & Engineering and Information technology Pondicherry

More information

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks Tibor Fabry-Asztalos, Nilesh Bhide and Krishna M. Sivalingam School of Electrical Engineering &

More information

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks Kwangil Lee Department of Electrical and Computer Engineering University of Texas, El Paso, TX 79928, USA. Email:

More information

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License Title Performance analysis of realistic optical time division multiplexed wavelength routed networks Author(s) Li, CY; Li, G; Wai, PKA; Li, VOK Citation The 8th IEEE Annual Workshop on Computer Communications

More information

Maximization of Single Hop Traffic with Greedy Heuristics

Maximization of Single Hop Traffic with Greedy Heuristics Maximization of Single Hop Traffic with Greedy Heuristics Esa Hyytiä Networking Laboratory, HUT, Finland, email: esa@netlab.hut.fi, ABSTRACT Maximization of the single hop traffic has been proposed as

More information

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing Mare Lole and Branko Mikac Department of Telecommunications Faculty of Electrical Engineering and Computing,

More information

Flow Isolation in Optical Networks

Flow Isolation in Optical Networks Flow Isolation in Optical Networs Hui Wang, George N. Rousas Operations Research / Department of Computer Science North Carolina State University Raleigh, NC 27695-8206 USA Email: {hwang4,rousas}@ncsu.edu

More information

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks Wojciech Molisz and Jacek Rak Gdansk University of Technology, G. Narutowicza 11/12, Pl-8-952 Gdansk, Poland

More information

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks Tamkang Journal of Science and Engineering, Vol. 14, No. 1, pp. 81 89 (2011) 81 A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks I-Shyan Hwang 1 *, San-Nan

More information

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005

OPTICAL NETWORKS. Optical Metro Networks. A. Gençata İTÜ, Dept. Computer Engineering 2005 OPTICAL NETWORKS Optical Metro Networks A. Gençata İTÜ, Dept. Computer Engineering 2005 Introduction Telecommunications networks are normally segmented in a three-tier hierarchy: Access, metropolitan,

More information

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms Sanjay K. Bose, SMIEEE, Y.N. Singh, MIEEE A.N.V.B. Raju Bhoomika Popat Department of Electrical

More information

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0 A Comparison of Allocation Policies in Wavelength Routing Networks Yuhong Zhu a, George N. Rouskas b, Harry G. Perros b a Lucent Technologies, Acton, MA b Department of Computer Science, North Carolina

More information

Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks

Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks Zeyu Liu, George N. Rouskas Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206,

More information

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects

A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER 2003 1081 A Study of Waveband Switching With Multilayer Multigranular Optical Cross-Connects Xiaojun Cao, Student Member, IEEE,

More information

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks Jason P. Jue, Member, IEEE, and Biswanath Mukherjee, Member, IEEE Abstract Wavelength-division multiplexing

More information

Hierarchical Traffic Grooming in WDM Networks

Hierarchical Traffic Grooming in WDM Networks Hierarchical Traffic Grooming in WDM Networks George N. Rouskas Department of Computer Science North Carolina State University Joint work with: Rudra Dutta (NCSU), Bensong Chen (Google Labs), Huang Shu

More information

Toward the joint design of electronic and optical layer protection

Toward the joint design of electronic and optical layer protection Toward the joint design of electronic and optical layer protection Massachusetts Institute of Technology Slide 1 Slide 2 CHALLENGES: - SEAMLESS CONNECTIVITY - MULTI-MEDIA (FIBER,SATCOM,WIRELESS) - HETEROGENEOUS

More information

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043

More information

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures

Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Multi-layer Network Recovery: Avoiding Traffic Disruptions Against Fiber Failures Anna Urra, Eusebi Calle, and Jose L. Marzo Institute of Informatics and Applications (IIiA), University of Girona, Girona

More information

A New Architecture for Multihop Optical Networks

A New Architecture for Multihop Optical Networks A New Architecture for Multihop Optical Networks A. Jaekel 1, S. Bandyopadhyay 1 and A. Sengupta 2 1 School of Computer Science, University of Windsor Windsor, Ontario N9B 3P4 2 Dept. of Computer Science,

More information

Signal-Quality Consideration for Dynamic Connection Provisioning in All- Optical Wavelength-Routed Networks

Signal-Quality Consideration for Dynamic Connection Provisioning in All- Optical Wavelength-Routed Networks Signal-Quality Consideration for Dynamic Connection Provisioning in All- Optical Wavelength-Routed Networks Biswanath Mukherjee Professor of Computer Science, UC Davis mukherje@cs.ucdavis.edu Acknowledgement:

More information

A Link Bundled Auxiliary Graph Model for Constrained Dynamic Traffic Grooming in WDM Mesh Networks

A Link Bundled Auxiliary Graph Model for Constrained Dynamic Traffic Grooming in WDM Mesh Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Journal Articles Computer Science and Engineering, Department of 8-2005 A Link Bundled Auxiliary Graph Model for Constrained

More information

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS K.Pushpanathan 1, Dr.A.Sivasubramanian 2 1 Asst Prof, Anand Institute of Higher Technology, Chennai-603103 2 Prof &

More information

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006 Master s Thesis Title Cross-Layer Traffic Engineering in IP over WDM Networks Supervisor Professor Masayuki Murata Author Yuki Koizumi February 15th, 2006 Graduate School of Information Science and Technology

More information

Elsevier Editorial System(tm) for Optical Switching and Networking Manuscript Draft

Elsevier Editorial System(tm) for Optical Switching and Networking Manuscript Draft Elsevier Editorial System(tm) for Optical Switching and Networking Manuscript Draft Manuscript Number: OSN-D-12-00081R1 Title: Constrained Light-tree Design for WDM Mesh Networks with Multicast Traffic

More information

Design of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic

Design of CapEx-Efficient IP-over-WDM Network using Auxiliary Matrix based Heuristic IEEE ANTS 2014 1570023335 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 60 61 62 63 64

More information

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a A Novel Optimization Method of Optical Network Planning Wu CHEN 1, a 1 The engineering & technical college of chengdu university of technology, leshan, 614000,china; a wchen_leshan@126.com Keywords:wavelength

More information

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions

IO2654 Optical Networking. WDM network design. Lena Wosinska KTH/ICT. The aim of the next two lectures. To introduce some new definitions IO2654 Optical Networking WDM network design Lena Wosinska KTH/ICT 1 The aim of the next two lectures To introduce some new definitions To make you aware about the trade-offs for WDM network design To

More information

Arc Perturbation Algorithms for Optical Network Design

Arc Perturbation Algorithms for Optical Network Design Applied Mathematical Sciences, Vol. 1, 2007, no. 7, 301-310 Arc Perturbation Algorithms for Optical Network Design Zbigniew R. Bogdanowicz Armament Research, Development and Engineering Center Building

More information

Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic

Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 29, NO. 17, SEPTEMBER 1, 2011 2577 Energy-Efficient Traffic GroominginWDM Networks With Scheduled Time Traffic Shuqiang Zhang, Student Member, IEEE, Dong Shen, Student

More information

On-Line Routing in WDM-TDM Switched Optical Mesh Networks

On-Line Routing in WDM-TDM Switched Optical Mesh Networks On-Line Routing in WDM-TDM Switched Optical Mesh Networks Arun Vishwanath and Weifa Liang Department of Computer Science The Australian National University Canberra, ACT-0200, Australia Email: {arunv,wliang}@cs.anu.edu.au

More information

A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks

A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks A Scalable Wavelength Assignment Algorithm Using Minimal Number of Wavelength Converters in Resilient WDM Networks Technical Report UTD/EE/4/2009 September 2009 Miguel Razo, Shreejith Billenahalli, Wanjun

More information

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 8, NO. 6, DECEMBER 2000 747 A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks Yuhong Zhu, George N. Rouskas, Member,

More information

A Hierarchical Model for Multigranular Optical Networks

A Hierarchical Model for Multigranular Optical Networks A Hierarchical Model for Multigranular Optical Networks Mohan Iyer, George N. Rouskas, Rudra Dutta {mliyer, rouskas, rdutta}@ncsu.edu Department of Computer Science, North Carolina State University, Raleigh,

More information

Capacity planning and.

Capacity planning and. Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Assume users have

More information

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids

Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids Deadline-Aware Co-Scheduling Using Anycast Advance Reservations in Wavelength Routed Lambda Grids Hitesh Kulkarni, Arush Gadkar, and Vinod M. Vokkarane Department of Computer and Information Science University

More information

Capacity planning and.

Capacity planning and. Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 6 Issue 8 August 2017, Page No. 22309-22313 Index Copernicus value (2015): 58.10 DOI: 10.18535/ijecs/v6i8.13

More information

Some economical principles

Some economical principles Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have

More information

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Distributed Clustering Method for Large-Scaled Wavelength Routed Networks Yukinobu Fukushima, Hiroaki Harai, Shin ichi Arakawa, and Masayuki Murata Graduate School of Information Science and Technology,

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Multicast traffic grooming in tap-and-continue WDM mesh networks Author(s) Citation Lin, Rongping; Zhong,

More information

Optical networking technology

Optical networking technology 1 Optical networking technology Technological advances in semiconductor products have essentially been the primary driver for the growth of networking that led to improvements and simplification in the

More information

Absolute QoS Differentiation in Optical Burst-Switched Networks

Absolute QoS Differentiation in Optical Burst-Switched Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO. 9, NOVEMBER 2004 1781 Absolute QoS Differentiation in Optical Burst-Switched Networks Qiong Zhang, Student Member, IEEE, Vinod M. Vokkarane,

More information

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING Mohamed KOUBAA, Nicolas PUECH, and Maurice GAGNAIRE Telecom Paris - LTCI -

More information

Lightpath Blocking Performance Analytical Model for a Single ROADM Node with Intra-Node Add/Drop Contention [Invited]

Lightpath Blocking Performance Analytical Model for a Single ROADM Node with Intra-Node Add/Drop Contention [Invited] Lightpath Blocking Performance Analytical Model for a Single ROADM Node with Intra-Node Add/Drop Contention [Invited] Li Gao, Yongcheng Li and Gangxiang Shen* School of Electronic and Information Engineering,

More information

Virtual Topologies for Multicasting with Multiple Originators in WDM Networks

Virtual Topologies for Multicasting with Multiple Originators in WDM Networks Virtual Topologies for Multicasting with Multiple Originators in WDM Networks Ian Ferrel Adrian Mettler Edward Miller Ran Libeskind-Hadas Department of Computer Science Harvey Mudd College Claremont, California

More information

Designing WDM Optical Networks using Branch-and-Price

Designing WDM Optical Networks using Branch-and-Price Designing WDM Optical Networks using Branch-and-Price S. Raghavan Smith School of Business & Institute for Systems Research University of Maryland College Park, MD 20742 raghavan@umd.edu Daliborka Stanojević

More information

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Proc. of Int. Conf. on Emerging Trends in Engineering and Technology Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming Vikas Kaushik 1, R.S Chauhan 2 1 JMIT Radaur/ECE

More information

A PRACTICAL AND COST-EFFECTIVE APPROACH TO EFFICIENT TRAFFIC GROOMING IN WDM MESH NETWORKS

A PRACTICAL AND COST-EFFECTIVE APPROACH TO EFFICIENT TRAFFIC GROOMING IN WDM MESH NETWORKS Chapter 1 A PRACTICAL AND COST-EFFECTIVE APPROACH TO EFFICIENT TRAFFIC GROOMING IN WDM MESH NETWORKS Harsha V. Madhyastha Department of Computer Science and Engineering University of Washington Seattle,

More information

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

Performance of Optical Burst Switching Techniques in Multi-Hop Networks Performance of Optical Switching Techniques in Multi-Hop Networks Byung-Chul Kim *, You-Ze Cho *, Jong-Hyup Lee **, Young-Soo Choi **, and oug Montgomery * * National Institute of Standards and Technology,

More information

Research on Control Routing Technology in Communication Network

Research on Control Routing Technology in Communication Network Appl. Math. Inf. Sci. 6 No. 1S pp. 129S-133S (2012) Applied Mathematics & Information Sciences An International Journal @ 2012 NSP Natural Sciences Publishing Cor. Research on Control Routing Technology

More information

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction Journal of the Korean Institute of Industrial Engineers Vol. 32, No. 3, pp. 219-225, September 2006. An Integer Programming Approach to Packing Lightpaths on WDM Networks Kyungsik Lee 1 Taehan Lee 2 Sungsoo

More information

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s

Edge Switch. setup. reject. delay. setup. setup ack. offset. burst. burst. release. φ l. long burst. short burst. idle. p s Performance Modeling of an Edge Optical Burst Switching ode Lisong Xu, Harry G Perros, George Rouskas Computer Science Department orth Carolina State University Raleigh, C 27695-7534 E-mail: flxu2,hp,rouskasg@cscncsuedu

More information

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]

Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China

More information

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee DIMACS Series in Discrete Mathematics and Theoretical Computer Science Fault-Tolerant Design of Wavelength-Routed Optical Networks S. Ramamurthy and Biswanath Mukherjee Abstract. This paper considers optical

More information

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network

Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network 91 Enhancing Bandwidth Utilization and QoS in Optical Burst Switched High-Speed Network Amit Kumar Garg and R S Kaler School of Electronics and Communication Eng, Shri Mata Vaishno Devi University (J&K),

More information

Design Methodologies and Algorithms for Survivable C-RAN

Design Methodologies and Algorithms for Survivable C-RAN 16 Regular papers ONDM 218 Design Methodologies and Algorithms for Survivable C-RAN Bahare M. Khorsandi, Federico Tonini, Carla Raffaelli DEI, University of Bologna Viale Risorgimento 2, 4136 Bologna,

More information

Optical Fiber Communications. Optical Networks- unit 5

Optical Fiber Communications. Optical Networks- unit 5 Optical Fiber Communications Optical Networks- unit 5 Network Terminology Stations are devices that network subscribers use to communicate. A network is a collection of interconnected stations. A node

More information

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches

On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches On The Complexity of Virtual Topology Design for Multicasting in WDM Trees with Tap-and-Continue and Multicast-Capable Switches E. Miller R. Libeskind-Hadas D. Barnard W. Chang K. Dresner W. M. Turner

More information

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic

Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Configuration of Offset Time in Optical Burst Switching Networks for Delay Sensitive Traffic Anupam Soni and Yatindra Nath Singh anusoni@iitk.ac.in,ynsingh@iitk.ac.in. Abstract In Optical Burst Switching

More information

Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks

Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Iterative Optimization in VTD to Maximize the Open Capacity of WDM Networks Karcius D.R. Assis, Marcio S. Savasini and Helio Waldman DECOM/FEEC/UNICAMP, CP. 6101, 13083-970 Campinas, SP-BRAZIL Tel: +55-19-37883793,

More information

Greening the Multi-Granular Optical Transport Network Design under the Optical Reach Constraint

Greening the Multi-Granular Optical Transport Network Design under the Optical Reach Constraint Greening the Multi-Granular Optical Transport Network Design under the Optical Reach Constraint Nabil Naas, urak Kantarci, and Hussein T. Mouftah School of Electrical Engineering and Computer Science University

More information